00:08:32<hexa->given that openai for example hires a retired u.s. army general, what standards are the mozilla people referring to?
00:09:52<fireonlive>oh i don't care about military this or military that im still salty about servo :p
00:16:30<hexa->lmao
00:20:04qwertyasdfuiopghjkl (qwertyasdfuiopghjkl) joins
00:22:46<fireonlive>:3
00:32:54etnguyen03 quits [Client Quit]
01:03:44etnguyen03 (etnguyen03) joins
01:13:36<fireonlive>re: drdisrespect tweet, he edited out, then added back in 'minor' from the original tweet o_O
01:13:55<fireonlive>removed it shortly after posting (within the same hour); edited back in ~30m ago
01:14:11<fireonlive>https://x.com/DrDisrespect/status/1805668256088572089/history
01:14:11<eggdrop>nitter: https://nitter.privacydev.net/DrDisrespect/status/1805668256088572089/history
01:15:04<fireonlive>oh, an hour after that
01:23:46jacksonchen666 quits [Ping timeout: 264 seconds]
01:29:40jacksonchen666 (jacksonchen666) joins
01:29:40jacksonchen666 quits [Client Quit]
01:51:47etnguyen03 quits [Client Quit]
02:08:09<ymgve_>what did the tweet say? gone now from both sites
02:09:37etnguyen03 (etnguyen03) joins
02:21:52<fireonlive>hmm odd seems to be here still.. twitter being twitter i suppose
02:22:00<fireonlive>ymgve_: here's his statement: https://bpa.st/HH67MEIMK6X6HSPEY4KCRXWMMU
02:22:31<ymgve_>oh it's the /history part
02:22:47<ymgve_>guess us non-users arent worthy enough to see edit histories
02:24:40<ymgve_>"look, what I did wasn't ILLEGAL" isn't a great defense
02:25:39etnguyen03 quits [Client Quit]
02:25:41<fireonlive>logged in to see history.. sheesh
02:50:48<pabs>anyone know how to grab cookies out of a Firefox browser profile?
02:50:56<pabs>(without using the UI)
02:51:28<nicolas17>I see a cookies.sqlite in the profile
02:52:19<nicolas17>can't read it while the browser is running though, I get "database is locked"
02:52:49<pabs>Mozilla--
02:52:49<eggdrop>[karma] 'Mozilla' now has -7 karma!
02:54:14<nicolas17>this is much better than it used to
02:54:30<nicolas17>it used to be Mork format https://www.jwz.org/hacks/mork.pl
03:01:23<pabs>aha, this works: sqlite3 -readonly file:cookies.sqlite?immutable=1 .dump
03:01:37<pabs>but it doesn't work if the profile is in private mode :(
03:01:55<pabs>(then cookies aren't saved to the file)
03:25:44<@JAA>Indeed, private mode is all in-memory I believe.
03:26:00<@JAA>So you need to get them from the dev tools instead.
03:26:55<pabs>makes sense I guess. profile converted to non-private but deleting everything on exit
03:35:50<nicolas17>https://support.apple.com/kb/HT214111 everything is buggy x_x
04:13:45<fireonlive>wow
04:37:17fireonlive is now known as notfireonlive
04:37:23notfireonlive is now known as fireonlive
04:38:45nicolas17 quits [Ping timeout: 272 seconds]
04:43:59nicolas17 joins
04:55:05pixel leaves [Error from remote client]
04:55:06pixel (pixel) joins
05:13:02nicolas17 quits [Remote host closed the connection]
05:13:29nicolas17 joins
05:14:51Juest quits [Ping timeout: 272 seconds]
05:17:11Juest (Juest) joins
05:22:12nertzy joins
05:22:27nicolas17 quits [Ping timeout: 272 seconds]
05:23:14nicolas17 joins
05:37:27Juesto (Juest) joins
05:39:33Juest quits [Ping timeout: 272 seconds]
05:39:34Juesto is now known as Juest
05:53:55nicolas17 quits [Ping timeout: 255 seconds]
05:57:37nicolas17 joins
06:02:28nicolas17 quits [Ping timeout: 255 seconds]
06:04:18nicolas17 joins
06:06:09Juest quits [Ping timeout: 272 seconds]
06:11:13nicolas17 quits [Ping timeout: 272 seconds]
06:29:05HP_Archivist quits [Read error: Connection reset by peer]
07:11:30BlueMaxima quits [Read error: Connection reset by peer]
07:18:43Ruthalas598 (Ruthalas) joins
07:21:31Ruthalas59 quits [Ping timeout: 272 seconds]
07:21:31Ruthalas598 is now known as Ruthalas59
07:24:10Arcorann (Arcorann) joins
07:24:33nulldata5 (nulldata) joins
07:25:57nulldata quits [Ping timeout: 272 seconds]
07:26:07nulldata5 is now known as nulldata
07:43:19medecau (medecau) joins
07:56:29MrMcNuggets (MrMcNuggets) joins
08:01:41monoxane2 (monoxane) joins
08:01:58monoxane2 quits [Remote host closed the connection]
08:02:37monoxane quits [Ping timeout: 255 seconds]
08:02:58monoxane2 (monoxane) joins
08:04:54Gadelhas56 joins
08:39:31medecau quits [Ping timeout: 255 seconds]
09:00:01Bleo1826007227196 quits [Client Quit]
09:01:20Bleo1826007227196 joins
09:08:00Bleo1826007227196 quits [Client Quit]
09:39:49nertzy quits [Read error: Connection reset by peer]
09:40:32nertzy joins
11:10:09nulldata quits [Ping timeout: 272 seconds]
11:16:07nulldata (nulldata) joins
12:07:42IDK quits [Client Quit]
12:13:17Gadelhas56 quits [Client Quit]
12:33:26nicolas17 joins
12:51:16Gadelhas56 joins
12:55:55Gadelhas56 quits [Ping timeout: 272 seconds]
13:38:59Arcorann quits [Ping timeout: 272 seconds]
13:40:23katocala quits [Remote host closed the connection]
13:47:12Gadelhas56 joins
14:37:38katocala joins
14:48:46<kiska>"lineblog" has been downsampled and dropped
15:10:11^ quits [Ping timeout: 272 seconds]
15:11:28^ (^) joins
15:12:33pixel leaves
15:12:35pixel (pixel) joins
15:18:24<kiska>"pagespersoorange" downsampled and dropped
15:33:25nertzy quits [Client Quit]
15:36:13nicolas17 quits [Ping timeout: 255 seconds]
15:48:54<kiska>"skyblog" downsampled and dropped
16:07:30<kiska>-_-
16:07:31<kiska>> SELECT max("claims") AS "claims" INTO "oldArchive"."1sSample"."reddit" FROM "reddit" GROUP BY time(1s)
16:07:31<kiska>name: result
16:07:31<kiska>time written
16:07:31<kiska>---- -------
16:07:31<kiska>0 7923167
16:07:32<eggdrop>[karma] '---- -----' now has -3 karma!
16:08:03<kiska>fireonlive JAA I think I should have started this downsampling exercise earlier :D
16:12:29<kiska>nyany if the stats stop updating pls ping me, I might have run out of disk space trying to downsample
16:41:07<katia>kska downsampled and dropped
16:57:09<fireonlive>perhaps x3
17:08:04matoro quits [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.]
17:08:19matoro joins
17:44:15nicolas17 joins
17:44:40MrMcNuggets quits [Client Quit]
17:49:47Ruthalas59 quits [Ping timeout: 272 seconds]
17:51:54Ruthalas59 (Ruthalas) joins
17:56:08Bleo1826007227196 joins
18:27:32<kiska>fireonlive katia:
18:27:33<kiska>> SELECT sum("size") AS "size" INTO "oldArchive"."1sSample"."reddit" FROM "reddit" GROUP BY time(1s), downloader
18:27:33<kiska>name: result
18:27:33<kiska>time written
18:27:33<kiska>---- -------
18:27:33<kiska>0 130700772
18:27:34<eggdrop>[karma] '---- -----' now has -4 karma!
18:27:36<kiska>REEEEEEE
18:36:31<katia>it went up kiska
18:36:34<katia>line go up
18:36:38<katia>time to IPO
18:42:31<fireonlive>xP
18:44:21<nicolas17>https://data.nicolas17.xyz/ ok I did it
18:45:39<nukke>what the f*ck
18:45:55<nicolas17>:3
18:46:20<kiska>lol
18:47:05<kiska>katia: > SELECT sum("items") AS "items" INTO "oldArchive"."10sSample"."reddit" FROM "1sSample"."reddit" GROUP BY time(10s), downloader
18:47:05<kiska>name: result
18:47:05<kiska>time written
18:47:05<kiska>---- -------
18:47:05<kiska>0 65606613
18:47:06<eggdrop>[karma] '---- -----' now has -5 karma!
18:47:17<kiska>Why are there so many results...
19:03:15DogsRNice joins
19:06:58<kiska>Even 1m samples is still alot
19:06:58<kiska>> SELECT sum("items") AS "items" INTO "oldArchive"."autogen"."reddit" FROM "30sSample"."reddit" GROUP BY time(1m), downloader
19:06:58<kiska>name: result
19:06:58<kiska>time written
19:06:58<kiska>---- -------
19:06:59<kiska>0 24657453
19:06:59<eggdrop>[karma] '---- -----' now has -6 karma!
19:13:59<masterx244|m>---- -----++
19:14:01<eggdrop>[karma] '---- -----' now has -7 karma!
19:14:12<masterx244|m>dafuq?
19:14:16<kiska>lmao :D
19:14:38<masterx244|m>should have reverted the downcount of your dash lines but somehow it got parsed the wrong way
19:14:43<kiska>Bot doesn't like you :p
19:14:55<masterx244|m>seems like there is a cockroach
19:17:11<kiska>influxdb doesn't like me right now https://server8.kiska.pw/uploads/d4c9643d2c4eda96/image.png
19:19:10<fireonlive>wait what lol
19:19:26<fireonlive>the math isn't mathing there...
19:19:33<fireonlive>hmm
19:19:49<fireonlive>JAA++ test--
19:19:50<eggdrop>[karma] 'JAA++ test' now has -1 karma!
19:20:05<fireonlive>¯\_(ツ)_/¯
19:22:55<@JAA>It's because there were two more -- in #prickant in the meantime.
19:23:26<kiska>Damn you got me :D
19:24:24<fireonlive>!
19:24:28<fireonlive>JAA sees all...
19:24:44<fireonlive>👁️👁️
19:25:04fireonlive reminds self to check audit log next time
19:25:20<kiska>:D
19:27:20<katia>👁 👁
19:28:48@JAA knows how to grep. :-P
19:29:40<fireonlive>:P
19:31:46<masterx244|m>gah, easy to not know that since you can't have the eyes everywhere
19:31:55<masterx244|m>---- -----++
19:31:56<eggdrop>[karma] '---- -----' now has -6 karma!
19:33:19<that_lurker>kiska: It's not hitting 100% usage so it's fineee. Gotta use all the power you have
19:37:34<@JAA>What good is all that RAM^Wdisk space if you don't use it‽
19:41:50<fireonlive>"The Wayback Machine, a time machine for the web" https://www.cbsnews.com/news/the-wayback-machine-a-time-machine-for-the-web/ https://dl.fireon.live/irc/48f50a83af3b356d/The%20Internet%20Archive's%20Wayback%20Machine%20%5BlMT2vD2aDkGqgy6hzfQic0LkV0RPCw7a%5D.mp4
19:41:59<fireonlive>mp4 provided since some said the cbs player is shit
19:42:05<fireonlive>but cbs news interviewed IA staff
19:42:25<fireonlive>(including brewster)
19:45:15<fireonlive>(ok two of them and a violist)
19:49:35<that_lurker>Is there a "detailed" video on the data ceter part of IA?
19:49:45<that_lurker>s/ceter/center
19:52:39<fireonlive>not that I know of.. but would be interesting
20:42:03<fireonlive>https://stulle123.github.io/posts/kakaotalk-account-takeover/ "We reported this vulnerability in December 2023 via Kakao’s Bug Bounty Program. However, we didn’t receive any reward as only Koreans are eligible to receive a bounty 🤯"
20:42:05<fireonlive>rest in piss :(
20:47:41<@JAA>Great job, you just publicly communicated that any non-Korean should rather abuse or sell security issues they find in your shit. :-)
20:54:06<fireonlive>indeed! :)
20:55:27<fireonlive>"Automatically replacing polyfill.io links with Cloudflare’s mirror for a safer Internet" https://blog.cloudflare.com/automatically-replacing-polyfill-io-links-with-cloudflares-mirror-for-a-safer-internet https://news.ycombinator.com/item?id=40804317
20:55:29<fireonlive>interesting
20:56:08<fireonlive>>Any website on the free plan has this feature automatically activated now. Websites on any paid plan can turn on this feature with a single click.
20:56:24<fireonlive>"Replace insecure JavaScript libraries"
20:58:57<@JAA>MitMaaS
20:59:25<nicolas17>eh, it seems reasonable to me
21:00:18<@JAA>Barto: https://www.alert.swiss/ still embeds polyfill.io. *facepalm*
21:00:35<@JAA>> Are you safe?
21:00:36<@JAA>:-)
21:01:00<fireonlive>lols
21:06:51<katia>virus link dont click
21:08:49etnguyen03 (etnguyen03) joins
21:27:50<nukke>thanks buttflare
21:36:22<Barto>JAA: i wonder how much damage was avoided with a proper Content Security Policy header
21:36:55<Barto>but i did ask a dude at work to double check if any indicator of compromise was visible
21:39:26<nicolas17>Barto: limited...
21:40:03<nicolas17>a proper CSP wouldn't prevent the evil code from running since surely you whitelisted polyfill.io, but yeah it would prevent the code going outside that
21:40:15<@JAA>Yeah, you'd need SRI, which virtually nobody uses.
21:40:53<nicolas17>the evil code *did* use other hostnames
21:41:39<nicolas17>"Sansec decoded one particular malware (see below) which redirects mobile users to a sports betting site using a fake Google analytics domain (www.googie-anaiytics.com)."
21:41:50<@JAA>Right, kind of amateurish there.
21:44:41^ quits [Remote host closed the connection]
21:44:55^ (^) joins
21:52:14<Barto>nicolas17: yeah, you wont reach googie-anaiytics for that reasons, agree it's not good, but it's a first step
21:58:42<fireonlive>"ID Verification Service for TikTok, Uber, X Exposed Driver Licenses" https://www.404media.co/id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix/
22:02:52<nicolas17>fireonlive: do you have an anti-loginwall version of this? :p
22:03:51<fireonlive>oh right
22:05:55<fireonlive>nicolas17: https://dl.fireon.live/irc/99c44039c9919d48/2024-06-26T22_05_39.539Z-https__www.404media.co_id-verification-service-for-tiktok-uber-x-exposed-driver-licenses-au10tix__action%3Dsubscribe%26success%3Dtrue.html
22:06:07<@JAA>fireonlive++
22:06:07<eggdrop>[karma] 'fireonlive' now has 56 karma!
22:06:21<fireonlive>:D
22:07:28<nicolas17>...adding ?action=subscribe&success=true to the original URL doesn't work, right? :|
22:07:36<nicolas17>yeah ok it doesn't
22:07:59<fireonlive>ah boo lol
22:18:12pixel leaves
22:18:13pixel (pixel) joins
22:42:57Dango360 quits [Read error: Connection reset by peer]
22:42:57BlueMaxima joins
22:49:36Dango360 (Dango360) joins
22:57:37Dango360 quits [Read error: Connection reset by peer]
23:00:39GNU_world joins
23:09:28etnguyen03 quits [Client Quit]
23:29:04<@JAA>> I hereby express my unwavering patience in awaiting your prompt response to the aforementioned correspondence.
23:29:07<@JAA>*adjusts monocle*
23:34:17etnguyen03 (etnguyen03) joins
23:37:41etnguyen03 quits [Remote host closed the connection]
23:39:59etnguyen03 (etnguyen03) joins
23:48:58lizardexile quits [Read error: Connection reset by peer]
23:49:10lizardexile joins